TJX theft checkpoint - easily setup (e.g. lock and key...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
TJX Companies Checkpoint On December 18 th , 2006 the company TJX (parent company to TJ Maxx, HomeGoods, and Marshalls) learned that its computer database had been infiltrated by hackers. These hackers injected suspicious software into the network and managed to steal over 45.7 million credit and debit card numbers. To date, this has been the worst credit/debit card theft in history. At the time of theft, TJX had limited security protocols in place. Essentially speaking, they were using a limited firewall system and basic wireless internet security. Post-theft investigations came to find that the hiring kiosks in their many stores were open for manipulation. It was also discovered that their wireless security was still based on the “WEP” (wired equivalent privacy) system. Even at the time, WEP was considered outdated and easy to crack. In order to fix these issues, TJX could have instated a restrictive firewall system on their network. Computer features could have been heavily restricted and hardware based limitations could have been
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: easily setup (e.g. lock and key system at hiring kiosks). The wireless security could have been beefed up to the more recent WPA (wifi protected access) as well. The overall changes that occurred due to the theft were pretty big. Most importantly, TJX began to comply with the strict financial guidelines that they previously ignored. Consumer groups and banks have also begun to lobby against the retail giant; filing lawsuits for lost data. In the end, more than 75 percent of consumers have refused to shop at the affected retailers. This has led to a financial massacre of TJX and to date; the company is still waiting for the final damage report. References Laudon, Kenneth C., and Jane Price. Laudon. "Chapter 7 - Securing Information Systems." Essentials of Management Information Systems . Upper Saddle River, NJ: Pearson/Prentice Hall, 2009. Print....
View Full Document

This note was uploaded on 10/17/2010 for the course IT 205 IT 205 taught by Professor Taylor during the Spring '09 term at University of Phoenix.

Page1 / 2

TJX theft checkpoint - easily setup (e.g. lock and key...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online